{"response":{"docs":[{"system_create_dtsi":"2020-05-15T23:04:33Z","system_modified_dtsi":"2020-05-15T23:15:48Z","has_model_ssim":["Article"],"id":"dv13zv62n","accessControl_ssim":["b7555794-f737-4fd6-8fd5-3b82b0269623"],"hasRelatedMediaFragment_ssim":["pr76f495c"],"hasRelatedImage_ssim":["pr76f495c"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence"],"date_uploaded_dtsi":"2020-05-15T23:04:33Z","date_modified_dtsi":"2020-05-15T23:04:33Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/sasd-4z96"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Adewale, Adewopo Victor","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users. In the past, cyberattacks were usually orchestrated in a random pattern of attack to lure unsuspecting targets. However, the cyber virtual environment is an ecosystem that provided a platform for an organized and sophisticated approach to launch an attack against a specific target group or organization by nefarious actors. In 2019, the average cost of cyber-attack in the US was about $1.6 million. This paper proposes a 3D framework to signal new threat alert before the actual occurrence of the threat on the surface web to alert cybersecurity experts and law enforcement agencies in preventive measures or means of mitigating the severity of damage caused by cyberattacks. The methodology combines information extracted from the deep web through a smart web crawler with socio-personal and technical indicators from twitter which is mapped with OTX (Open Threat Exchange). The OTX is an open-source cyber threat platform managed by security experts. The OTX endpoint security tool(OTX python SDK) will be used to identify a new type of cyber threats. The effectiveness of the framework will be tested using the machine learning algorithm precision-recall rate."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/13 "],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/pr76f495c?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pr76f495c"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["pr76f495c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SCRAPING THE DEEP WEB A 3DIMENSIONAL FRAMEWORK FOR CYBERTHREAT INTELLIGENCE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/dv13zv62n"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086680855478272,"timestamp":"2021-04-15T06:26:20.247Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:02:12Z","system_modified_dtsi":"2020-05-15T23:02:18Z","has_model_ssim":["Article"],"id":"qv33rz232","accessControl_ssim":["7f04e6fb-3493-481e-be74-061e8c6b5fbc"],"hasRelatedMediaFragment_ssim":["m039k605q"],"hasRelatedImage_ssim":["m039k605q"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes"],"date_uploaded_dtsi":"2020-05-15T23:02:12Z","date_modified_dtsi":"2020-05-15T23:02:12Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/g4dj-bj96"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Ponnakanti, Hari Priya","Ozer, Murat","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This paper looks at the opportunities and challenges of implementing blockchain technology across the medical sector and provides a clear view which can enable blockchain for more extents. After a notable research on underlying blockchain technology which offers distributed governance, immutable audit trail, provenance of data, robustness and privacy, we contrasted blockchain innovations and identified prominent applications of it in historically decentralized healthcare sectors. As the healthcare industry faces many challenges like unauthorised data sharing, lack of data transparency, ransomware, data breaches and cyber crimes, blockchain is one of the best ways to enhance data sharing and to mitigate prominent cyber crimes. By proper designing of a decentralized and immutable blockchain network where the data is dispersed among credentialed social insurance experts guarantees that cybercriminals cannot touch single patient’s confidential data, which facilitates encryption or cryptography of personal data where no patient’s emergency data is at extreme hazard. Blockchain trust-worthy cloud is one of the most powerful and secure ways of storing high confidential data. After analysing Blockchain implementations and identifying its potential in healthcare, we conclude with several promising directions for future research."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/2"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/m039k605q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["m039k605q"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["m039k605q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RELATIVE IMPORTANCE OF BLOCKCHAIN IN HEALTH CARE ENHANCING DATA SHARING AND MITIGATING CYBER SECURITY CRIMES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/qv33rz232"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086685715628032,"timestamp":"2021-04-15T06:26:24.882Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:00:14Z","system_modified_dtsi":"2020-05-15T23:00:16Z","has_model_ssim":["Article"],"id":"xd07gt933","accessControl_ssim":["8c66a3d3-5a92-4ed3-9acd-293699c27565"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["A methodology for cyberthreat ranking"],"date_uploaded_dtsi":"2020-05-15T23:00:14Z","date_modified_dtsi":"2020-05-15T23:00:14Z","isPartOf_ssim":["admin_set/default"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Bakare, Adeyinka","Said, Hazem"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["National Institute of Standards and Technology (NIST) recommends that organizations perform cyber risk assessments regularly to identify security vulnerabilities and to control levels of exposure to threats. We discuss a method to customize the ranking of cyber threats based on the organization’s maturity level of implementing NIST controls and we use FAIR model’s LEF component as a measure of the severity of cyber threats. The methodology integrates NIST maturity levels to calculate the resistance strength factor and produce the LEF values for each threat. The LEF value is then used to represent the severity level of the threat to the specific organization. This hybrid risk assessment approach will help stakeholders make data-informed decisions on improving security measures and provide accurate values that represent the current security state of their organization."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/1 "],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"METHODOLOGY FOR CYBERTHREAT RANKING","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/xd07gt933"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086683829239808,"timestamp":"2021-04-15T06:26:23.083Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:56:38Z","system_modified_dtsi":"2020-05-15T23:16:12Z","has_model_ssim":["Article"],"id":"1z40kv09z","accessControl_ssim":["46d78754-13db-4305-a31a-27bc1d17960d"],"hasRelatedMediaFragment_ssim":["dr26xz84f"],"hasRelatedImage_ssim":["dr26xz84f"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Application of Autoencoder Duets in Anomaly and Intrusion Detection"],"date_uploaded_dtsi":"2020-05-15T22:56:38Z","date_modified_dtsi":"2020-05-15T22:56:38Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/vm3m-xy59"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Li, Chengcheng","Lee, Kijung","Mathur, Nitin","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Signature-based intrusion detection methods report high accuracy with a low false alarm rate. However, they do not perform well when faced with new or emerging threats. This work focuses on anomaly-based data driven methods to identify potential zero-day-attacks using a specific class of neural networks known as the autoencoder."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/10"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/dr26xz84f?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dr26xz84f"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["dr26xz84f"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"APPLICATION OF AUTOENCODER DUETS IN ANOMALY AND INTRUSION DETECTION","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/1z40kv09z"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086688839335936,"timestamp":"2021-04-15T06:26:27.861Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:54:08Z","system_modified_dtsi":"2020-05-15T22:54:15Z","has_model_ssim":["Article"],"id":"zg64tn28v","accessControl_ssim":["664c047c-49e5-4477-bf88-3b75e93e0ef1"],"hasRelatedMediaFragment_ssim":["x633f248w"],"hasRelatedImage_ssim":["x633f248w"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models"],"date_uploaded_dtsi":"2020-05-15T22:54:08Z","date_modified_dtsi":"2020-05-15T22:54:08Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/s06w-fs50"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Varlioglu, M. Said","Sagir, Mustafa"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Previous studies have offered a variety of explanations on the relationship between democracy and the internet. Some argue that with free access to information, knowledge sharing without any constraint, and the spread of political knowledge, the internet will help change people’s political attitudes and spread democracy. Other studies found that authoritarian regimes by censoring the internet, tracking the political activist, prosecuting the dissidents, and using the internet to spread their propaganda limit the democratization. Also, some studies explored the effects of diffusion of false news through the internet and especially via social media. However, most of these studies concentrate on regions, specific states or authoritarian regimes. No study has investigated the influence of the internet in partly free countries defined by the Freedom House. Moreover, very little is known about the effects of online censorship on the development, stagnation, or decline of democracy. To fully understand the impact of the internet and online censorship on democratization in partly free countries, we must explore these relationships in these countries. Drawing upon the International Telecommunication Union, Freedom House, and World Bank reports and using machine learning methods, this study sheds new light on the effects of the internet on democratization in partly free countries. The findings suggest that internet penetration and online censorship both have a negative impact on democracy scores and the internet’s effect on democracy scores is conditioned by online censorship. Moreover, results from random forest suggest that online censorship is the most important variable followed by governance index and education on democracy scores."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":[" https://itexpo20.live/research/14"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/x633f248w?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["x633f248w"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["x633f248w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"EXPLAINING THE RELATIONSHIP BETWEEN INTERNET AND DEMOCRACY IN PARTLY FREE COUNTRIES USING MACHINE LEARNING MODELS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/zg64tn28v"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086685150445568,"timestamp":"2021-04-15T06:26:24.343Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:52:13Z","system_modified_dtsi":"2020-05-15T22:52:20Z","has_model_ssim":["Article"],"id":"np193b58c","accessControl_ssim":["90496c03-c2c3-4a9c-9924-43adf80f0951"],"hasRelatedMediaFragment_ssim":["x920fz21j"],"hasRelatedImage_ssim":["x920fz21j"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Social Networks of Technology Caregivers and Caregivees"],"date_uploaded_dtsi":"2020-05-15T22:52:13Z","date_modified_dtsi":"2020-05-15T22:52:13Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/ggzt-4q19"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Kaushik, Sanjana","Elrod, Nathan J."],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["The paper focuses on exploring the social networks of technology caregivers and caregivees and also work on learning their preferred mode of information exchange. Responses from the participants of the study will throw light on the relationships between different efficacies (discussed in detail in the paper) that may have an impact on an individual’s decision. Participant’s responses are recorded through well constructed surveys that have been distributed around by word of mouth or specific social media platforms which will also prove if being a power user has any effect on the end result. The responses will be analyzed and the various efficacy constructs such as self efficacy, community collective efficacy will be kept in mind."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/12"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/x920fz21j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["x920fz21j"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["x920fz21j"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SOCIAL NETWORKS OF TECHNOLOGY CAREGIVERS AND CAREGIVEES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/np193b58c"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086682755497984,"timestamp":"2021-04-15T06:26:22.059Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:50:12Z","system_modified_dtsi":"2020-05-15T22:50:19Z","has_model_ssim":["Article"],"id":"pz50gx42n","accessControl_ssim":["fcc3cdaa-855f-4f54-b6f9-b8493f2900f3"],"hasRelatedMediaFragment_ssim":["z029p6046"],"hasRelatedImage_ssim":["z029p6046"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["A Community-based Approach to Co-Managing Privacy and Security in Smart Homes"],"date_uploaded_dtsi":"2020-05-15T22:50:12Z","date_modified_dtsi":"2020-05-15T22:50:12Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/p2kf-mn08"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Brandopadhayay, Rajdeep","Halse, Shane","Elrod, Nathan J.","Kropczynski, Jess","Burden, Eric"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This study proposes enhanced oversight of smart homes by leveraging the social networks of homeowners to co-monitor for emergencies, while being mindful of privacy preserving features necessary for adoption. A pilot co-design workshop was conducted to determine features for co-monitoring. A group of four participants provided early findings and informed modifications to study design, and new insights for user behavior were emphasized. By refining the study design, we hope to better target users’ tacit knowledge in future workshops. Early findings include the users’ need for more than simply sharing access to a camera during an emergency in the home; users desired control over the microphone, the camera video stream, and the length of time. We believe this work will contribute to a broader understanding of features that better meet the needs and goals of smart device owners to enable co-monitoring.\r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/11"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/z029p6046?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["z029p6046"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["z029p6046"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"COMMUNITYBASED APPROACH TO COMANAGING PRIVACY AND SECURITY IN SMART HOMES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/pz50gx42n"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086686893178880,"timestamp":"2021-04-15T06:26:26.005Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:47:56Z","system_modified_dtsi":"2020-05-15T23:24:21Z","has_model_ssim":["Article"],"id":"tt44pp09h","accessControl_ssim":["83ea3652-4301-48ac-883f-9a5fbbf28025"],"hasRelatedMediaFragment_ssim":["gx41mk17p"],"hasRelatedImage_ssim":["gx41mk17p"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Smart Home Repos: Taking Data from Devices"],"date_uploaded_dtsi":"2020-05-15T22:47:55Z","date_modified_dtsi":"2020-05-15T23:24:21Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/1p51-4y21"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Mahajan, Pranav"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This is an ongoing research project focused on creating a framework for capturing various artifacts concerning Internet of Things devices. Research has shown a severe lack of frameworks focusing on collecting data from and about IoT devices. Mozilla’s WebThings Gateway focuses on collecting this information from the devices. This project expects to find methods of IoT data collection through a proposed test-bed utilizing the WebThings Gateway."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/9"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/gx41mk17p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["gx41mk17p"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["gx41mk17p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SMART HOME REPOS TAKING DATA FROM DEVICES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/tt44pp09h"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086683333263360,"timestamp":"2021-04-15T06:26:22.610Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:45:56Z","system_modified_dtsi":"2020-05-15T22:46:03Z","has_model_ssim":["Article"],"id":"2f75r916x","accessControl_ssim":["93596cd5-d3bb-4ef4-89df-3c9288060bb2"],"hasRelatedMediaFragment_ssim":["s7526d822"],"hasRelatedImage_ssim":["s7526d822"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Understanding Decision-Making Needs of Open Government Data Users"],"date_uploaded_dtsi":"2020-05-15T22:45:56Z","date_modified_dtsi":"2020-05-15T22:45:56Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/shpp-5481"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Murthy, Svati Sundara"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Open Government Data (OGD) promotes transparency, innovation, and value creation that makes information gathered by the government about the city and community open to all. The City of Cincinnati Open Government Data Portal allows citizens to access local data as part of a local OGD initiative. Although these datasets are available and are used by a broad audience, little is known about how users engage with this data and the general usability of the platforms. To learn more about this audience, this study is conducted in two steps 1)- a think-aloud activity and 2)- an online survey. Through these activities, we aim to gather information about how the users are interacting with the available data and for what purpose are they interacting with different sections of the portal. After gathering relevant data from the think-aloud activity, we aim to generate a questionnaire by analyzing all the information collected in the previous event at a larger scale. Using a web-based survey shared with individuals via Qualtrics, we will explore the use of the portal to gain more insight and knowledge on user requirements and their suggestions. The endpoint of this study is to develop insights that will help us understand user expectations and how changes could benefit the portal."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/5"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/s7526d822?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["s7526d822"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["s7526d822"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"UNDERSTANDING DECISIONMAKING NEEDS OF OPEN GOVERNMENT DATA USERS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/2f75r916x"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086686287101952,"timestamp":"2021-04-15T06:26:25.427Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:43:40Z","system_modified_dtsi":"2020-05-15T22:43:44Z","has_model_ssim":["Article"],"id":"j098zc44r","accessControl_ssim":["d4c63124-cd44-4db2-a724-5d521d4e7b58"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach"],"date_uploaded_dtsi":"2020-05-15T22:43:40Z","date_modified_dtsi":"2020-05-15T22:43:40Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/g8mz-xf69"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Alalade, Emmanuel Dare"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Internet of Things (IoT) enabled smart homes to have made our daily lives easier, but these conveniences have also introduced security concerns. IoT devices hold security risks as well as smart home hubs and gateways. Gateways present a centralized point of communication among devices that can create a backdoor into network data for hackers but also present a detection opportunity. Intrusion detection is a common way to detect anomalies in network traffic. This paper introduces early work on an intrusion detection system (IDS) by detecting anomalies in the smart home network using Extreme Learning Machine and Artificial Immune System (AIS ELM). AIS uses the clonal Algorithm for the optimization of the input parameters, and ELM analyzes the input parameter for better convergence in detecting anomalous activity. The larger goal of this work is to apply this approach to a smart home network gateway and combined it with a push notification system that will allow the homeowner to identify any abnormalities in the smart home network and take appropriate action."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/3"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"INTRUSION DETECTION SYSTEM IN SMART HOME NETWORK USING ARTIFICIAL IMMUNE SYSTEM AND EXTREME LEARNING MACHINE HYBRID APPROACH","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/j098zc44r"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086687355600896,"timestamp":"2021-04-15T06:26:26.446Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Image","hits":4793,"label":"Image"},{"value":"Dataset","hits":3723,"label":"Dataset"},{"value":"Etd","hits":994,"label":"Etd"},{"value":"Document","hits":978,"label":"Document"},{"value":"Article","hits":963,"label":"Article"},{"value":"Student Work","hits":755,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Snider, Jerry A. (senior collector)","hits":3484,"label":"Snider, Jerry A. (senior collector)"},{"value":"Tepe, Eric (record/image)","hits":3484,"label":"Tepe, Eric (record/image)"},{"value":"Huston, Ron","hits":2344,"label":"Huston, Ron"},{"value":"He, Si (co-collector)","hits":1093,"label":"He, Si (co-collector)"},{"value":"Meyer, David L.","hits":631,"label":"Meyer, David L."},{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Kingdom: Plantae","hits":3453,"label":"Kingdom: Plantae"},{"value":"Phylum: Bryophyta","hits":3146,"label":"Phylum: Bryophyta"},{"value":"Class: Bryopsida","hits":2902,"label":"Class: Bryopsida"},{"value":"Biology","hits":2361,"label":"Biology"},{"value":"Order: Hypnales","hits":1190,"label":"Order: Hypnales"},{"value":"Order: Dicranales","hits":369,"label":"Order: Dicranales"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":6145,"label":"Arts and Sciences"},{"value":"Engineering and Applied Science","hits":2769,"label":"Engineering and Applied Science"},{"value":"Design, Architecture, Art and Planning","hits":1235,"label":"Design, Architecture, Art and Planning"},{"value":"Other","hits":1070,"label":"Other"},{"value":"Libraries","hits":663,"label":"Libraries"},{"value":"Education, Criminal Justice, and Human Services","hits":540,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Biological Sciences","hits":3503,"label":"Biological Sciences"},{"value":"Mechanical and Materials Engineering","hits":2264,"label":"Mechanical and Materials Engineering"},{"value":"Other","hits":992,"label":"Other"},{"value":"Simpson Center for Urban Futures ","hits":784,"label":"Simpson Center for Urban Futures "},{"value":"Classics","hits":769,"label":"Classics"},{"value":"Romance \u0026 Arabic Languages \u0026 Literat","hits":644,"label":"Romance \u0026 Arabic Languages \u0026 Literat"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1950,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"English ","hits":145,"label":"English "},{"value":"Russian","hits":34,"label":"Russian"},{"value":"Spanish","hits":24,"label":"Spanish"},{"value":"German","hits":19,"label":"German"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)","hits":3484,"label":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)"},{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"University of Cincinnati: Romance and Arabic Languages and Literatures","hits":603,"label":"University of Cincinnati: Romance and Arabic Languages and Literatures"},{"value":"University of Cincinnati ","hits":100,"label":"University of Cincinnati "},{"value":"viDEO sAVant","hits":92,"label":"viDEO sAVant"},{"value":"Benjamin Britton","hits":60,"label":"Benjamin Britton"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2017","hits":2305,"label":"2017"},{"value":"","hits":211,"label":""},{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2017-10-31","hits":163,"label":"2017-10-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"1r66j250c","hits":3484,"label":"1r66j250c"},{"value":"79407x47z","hits":2123,"label":"79407x47z"},{"value":"05741w32f","hits":341,"label":"05741w32f"},{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"x346d4806","hits":219,"label":"x346d4806"},{"value":"bc387z838","hits":189,"label":"bc387z838"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":12568,"label":"Work"},{"value":"Collection","hits":171,"label":"Collection"}],"label":"Generic Type Sim"}],"pages":{"current_page":263,"next_page":264,"prev_page":262,"total_pages":1274,"limit_value":10,"offset_value":2620,"total_count":12739,"first_page?":false,"last_page?":false}}}